Handbook of Research on Information Security and Assurance

Handbook of Research on Information Security and Assurance

Jatinder N. D. Gupta (The University of Alabama in Huntsville, USA) and Sushil Sharma (Ball State University, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: August, 2008|Copyright: © 2009 |Pages: 586
DOI: 10.4018/978-1-59904-855-0
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
  • Printed-On-Demand (POD)
  • Usually ships one day from order
(Multi-User License)
List Price: $265.00
10% Discount:-$26.50
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
(Multi-User License)
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
(Individual Chapters)
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.

The Handbook of Research on Information Security and Assurance includes 47 chapters offering comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by over 90 scholars in information science, this reference provides tools to combat the growing risk associated with technology.


The many academic areas covered in this publication include, but are not limited to:

  • Aomaly detection
  • Bioterrism and biosecurity
  • Cryptography for information security
  • Cyber hijacking
  • Data security for storage area networks
  • Enterprise security federation
  • Enterprise VoIP security
  • Ethical concerns in security
  • Firewalls
  • Human factors in information security
  • Information availability
  • Information security assurance
  • Information security research
  • Information systems risk management
  • Information Warfare
  • Internal auditing for information assurance
  • Memory corruption attacks
  • Network Monitoring
  • Security policies and procedures
  • Security risks and counter risks
Reviews and Testimonials

The coverage of this handbook of research on information assurance and security provides a reference resource for both information science and technology researchers and also decision makers in obtaining a greater understanding of the concepts, issues, problems, trends, challenges and opportunities related to this field of study.

– Jatinder N. D. Gupta, University of Alabama, USA

Each article includes full references, making this a good source of research topics as well as a handbook.

– Book News Inc. (December 2008)
Table of Contents
Search this Book:
Editor/Author Biographies
Jatinder (Jeet) N. D. Gupta is currently eminent scholar of management of technology, professor of management information systems, industrial and systems engineering and engineering management at The University of Alabama in Huntsville, Huntsville, Alabama. Most recently, he was professor of management, information and communication sciences, and industry and technology at Ball State University, Muncie, Indiana. He holds a PhD in industrial engineering (with specialization in production management and information systems) from Texas Tech University. Co-author of a textbook in Operations Research, Dr. Gupta serves on the editorial boards of several national and international journals. Recipient of the Outstanding Faculty and Outstanding Researcher awards from Ball State University, he has published numerous papers in such journals as Journal of Management Information Systems, International Journal of Information Management, Operations Research, INFORMS Journal of Computing, Annals of Operations Research, and Mathematics of Operations Research. More recently, he served as a co-editor of several special issues including the Neural Networks in Business of Computers and Operations Research, Semiconductor Wafer Production, special issue of Production Planning and Control, and Design, Building and Evaluation of Intelligent Decision Making Support Systems: Special Issue of Journal of Decision Systems. He co-edited books that included Decision Making Support Systems: Achievements and Challenges for the New Decade and Creating Knowledge-based Healthcare Organizations published by Idea Group Publishing. He is also the coeditor of the book: Managing E-Business published by Heidelberg Press, Heidelberg, Australia and the book: Intelligent Decision-making Support Systems, published by Springer. His current research interests include information security, e-commerce, supply chain management, information and decision technologies, scheduling, planning and control, organizational learning and effectiveness, systems education, knowledge management, and enterprise integration. Dr. Gupta has held elected and appointed positions in several academic and professional societies including the Association for Information Systems, Production and Operations Management Society (POMS), the Decision Sciences Institute (DSI), and the Information Resources Management Association (IRMA).
Sushil K. Sharma is currently Associate Dean and Professor of Information Systems and Executive Director of the MBA and Certificate Programs at the Miller College of Business, Ball State University (Muncie, Indiana, USA). He co-edited five books that include the Handbook of Research on Information Assurance and Security and Creating Knowledge-based Healthcare Organizations. He is also the co-editor of the book: Managing E-Business (Heidelberg Press, Australia). Dr. Sharma has authored over 100 refereed research papers in many peer-reviewed national and international MIS and management journals, conferences proceedings and books. He serves on editorial boards of several national and international journals and has also edited special issues. He is the founding Editor-in-Chief of the International Journal of E-Adoption. His primary teaching and research interests are in e-commerce, computer-mediated communications, community and social informatics, information systems security, e-government, ERP systems, database management systems, cluster computing, Web services and knowledge management. He has a wide consulting experience in information systems and e-commerce and he has served as an advisor and consultant to several government and private organizations including projects funded by the World Bank.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Review Board
  • Elisa Bertino, Purdue University, USA
  • Queen Booker, Minnesota State University, Mankato, USA
  • Mei Cao, Arkansas State University, USA
  • Amita Goyal Chin, Virginia Commonwealth University, USA
  • Gurpreet Dhillon, Virginia Commonwealth University, USA
  • Sanjay Goel, State University of New York, USA
  • Ajay K. Gupta, Gsecurity, USA
  • Sushil Jajodia, George Mason University, USA
  • Stephan Jones, Ball State University, USA
  • Shivraj Kanungo, George Washington University, USA
  • Pradeep Khosla, Carnegie Mellon University, USA
  • Ronlad Kovac, Ball State University, USA
  • Vipin Kumar, University of Minnesota, USA
  • Eldon Y. Li, National Chengchi University, Taiwan
  • Dengpan Liu, University of Alabama in Huntsville, USA
  • Herbert J. Mattord, Kennesaw State University, USA
  • P.K. Mahanti, University of New Brunswick, Canada
  • Joon S. Park, Syracuse University, USA
  • Mike Raisinghani, Texas Woman's University, USA
  • M. K. Raja, University of Texas at Arlington, USA
  • Rajeev Raje, Indiana University Purdue University Indianapolis, USA
  • Rathindra Sarathy, Oklahoma State University, USA
  • Mohini Singh, RMIT, Australia
  • Jim Tiller, (ISC)2 Journal, USA
  • Vijay Varadharajan, Macquarie University, Australia
  • Mark Weiser, Oklahoma State University, USA
  • Michael Whitman, Kennesaw State University, USA
  • Branden Williams, VeriSign, USA
  • John Zeleznikow, Victoria University, Australia